http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Image steganography in spatial domain: A survey
Hussain, Mehdi,Wahab, Ainuddin Wahid Abdul,Idris, Yamani Idna Bin,Ho, Anthony T.S.,Jung, Ki-Hyun Elsevier 2018 SIGNAL PROCESSING-IMAGE COMMUNICATION - Vol.65 No.-
<P><B>Abstract</B></P> <P>This paper presents a literature review of image steganography techniques in the spatial domain for last 5 years. The research community has already done lots of noteworthy research in image steganography. Even though it is interesting to highlight that the existing embedding techniques may not be perfect, the objective of this paper is to provide a comprehensive survey and to highlight the pros and cons of existing up-to-date techniques for researchers that are involved in the designing of image steganographic system. In this article, the general structure of the steganographic system and classifications of image steganographic techniques with its properties in spatial domain are exploited. Furthermore, different performance matrices and steganalysis detection attacks are also discussed. The paper concludes with recommendations and good practices drawn from the reviewed techniques.</P> <P><B>Highlights</B></P> <P> <UL> <LI> This paper presents literature review of spatial domain image steganography techniques published in recent 5 years. </LI> <LI> The objective is to provide a comprehensive survey and to highlight the pros and cons on up-to-date techniques. </LI> <LI> The structure of the steganographic system and classifications of image steganography with its properties are discussed. Also, the recommendations and good practices are discussed. </LI> </UL> </P>
Mehdi Hussain,Ainuddin Wahid Abdul Wahab,Ishrat Batool,Muhammad Arif 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.2
The significance of digital information security has been enhanced due to the boost of internet communication. Providing security for server client communication over the internet is a critical issue due to open world digital eavesdroppers. Generally, password authentication is required for establishing a connection between server and client environment. The client password is verified by the server ends to establish a valid connection. Successful password verification initiates the client and server to perform further secured request and response mechanisms. The problem of password authentication over insecure networks presents in many application areas, such as web login, remote logins of computer networks. Hence the significance of confidential password transmission over insecure internet becomes the necessity of secure authentication. In this paper, we proposed a secure password transmission over the internet for authentication of server/client environment using encryption and image steganography. Client password is first encrypted and embedded in an image using steganographic algorithm at client side and transmitted over unsecured network to the web server. On the other side server extract safely password from image steganography decoding algorithm, decrypt and verified it’s with SQL database server. In case if the intruder steals the image over network he/she will be unable to decode the password from the image. The prototype of the proposed method is implemented using JavaScript, Html, and ASP.net for verification purpose.
Intelligent Agent Based Architectures for E-Learning System : Survey
Muhammad Arif,Mehdi Hussain 보안공학연구지원센터 2015 International Journal of u- and e- Service, Scienc Vol.8 No.6
E-learning is the internet enabled learning. Internet has ongoing to restructuring education. Intelligent agent based e-learning provide a common infrastructure to assimilate varied software components. There are two sorts of e-learning synchronous and asynchronous. This paper described the detail of well-known agent based architecture for e-learning. E-learning is going to be gigantic. There are multiple benefits of e-learning; it is convenient, self-service mix, match, on demand any time anyplace, private learning, Self-paced and elastic. E-learning provide cost effective and virtual environment. E-learning gives the ability to user to collect the quantifiable and sensible material, examine, and distribute and custom e-learning knowledge from multiple e learning sources.